Files
claudetools/api/models/firewall_rule.py
Mike Swanson 390b10b32c Complete Phase 6: MSP Work Tracking with Context Recall System
Implements production-ready MSP platform with cross-machine persistent memory for Claude.

API Implementation:
- 130 REST API endpoints across 21 entities
- JWT authentication on all endpoints
- AES-256-GCM encryption for credentials
- Automatic audit logging
- Complete OpenAPI documentation

Database:
- 43 tables in MariaDB (172.16.3.20:3306)
- 42 SQLAlchemy models with modern 2.0 syntax
- Full Alembic migration system
- 99.1% CRUD test pass rate

Context Recall System (Phase 6):
- Cross-machine persistent memory via database
- Automatic context injection via Claude Code hooks
- Automatic context saving after task completion
- 90-95% token reduction with compression utilities
- Relevance scoring with time decay
- Tag-based semantic search
- One-command setup script

Security Features:
- JWT tokens with Argon2 password hashing
- AES-256-GCM encryption for all sensitive data
- Comprehensive audit trail for credentials
- HMAC tamper detection
- Secure configuration management

Test Results:
- Phase 3: 38/38 CRUD tests passing (100%)
- Phase 4: 34/35 core API tests passing (97.1%)
- Phase 5: 62/62 extended API tests passing (100%)
- Phase 6: 10/10 compression tests passing (100%)
- Overall: 144/145 tests passing (99.3%)

Documentation:
- Comprehensive architecture guides
- Setup automation scripts
- API documentation at /api/docs
- Complete test reports
- Troubleshooting guides

Project Status: 95% Complete (Production-Ready)
Phase 7 (optional work context APIs) remains for future enhancement.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-01-17 06:00:26 -07:00

109 lines
3.0 KiB
Python

"""
Firewall rule model for network security rules.
Firewall rules track network security rules for documentation and audit trail
purposes, including source/destination CIDRs, ports, protocols, and actions.
"""
from typing import Optional
from sqlalchemy import CHAR, CheckConstraint, ForeignKey, Index, Integer, String, Text
from sqlalchemy.orm import Mapped, mapped_column
from .base import Base, TimestampMixin, UUIDMixin
class FirewallRule(Base, UUIDMixin, TimestampMixin):
"""
Firewall rule model for network security rules.
Tracks firewall rules for documentation and audit trail purposes,
including source and destination CIDRs, ports, protocols, and
allow/deny/drop actions.
Attributes:
infrastructure_id: Reference to the infrastructure this rule applies to
rule_name: Name of the firewall rule
source_cidr: Source CIDR notation
destination_cidr: Destination CIDR notation
port: Port number
protocol: Protocol (tcp, udp, icmp)
action: Action to take (allow, deny, drop)
rule_order: Order of the rule in the firewall
notes: Additional notes
created_at: When the rule was created
created_by: Who created the rule
"""
__tablename__ = "firewall_rules"
# Foreign keys
infrastructure_id: Mapped[Optional[str]] = mapped_column(
CHAR(36),
ForeignKey("infrastructure.id", ondelete="CASCADE"),
doc="Reference to the infrastructure this rule applies to"
)
# Rule identification
rule_name: Mapped[Optional[str]] = mapped_column(
String(255),
doc="Name of the firewall rule"
)
# Rule configuration
source_cidr: Mapped[Optional[str]] = mapped_column(
String(100),
doc="Source CIDR notation"
)
destination_cidr: Mapped[Optional[str]] = mapped_column(
String(100),
doc="Destination CIDR notation"
)
port: Mapped[Optional[int]] = mapped_column(
Integer,
doc="Port number"
)
protocol: Mapped[Optional[str]] = mapped_column(
String(20),
doc="Protocol: tcp, udp, icmp"
)
action: Mapped[Optional[str]] = mapped_column(
String(20),
doc="Action: allow, deny, drop"
)
# Rule ordering
rule_order: Mapped[Optional[int]] = mapped_column(
Integer,
doc="Order of the rule in the firewall"
)
# Notes
notes: Mapped[Optional[str]] = mapped_column(
Text,
doc="Additional notes"
)
# Audit information
created_by: Mapped[Optional[str]] = mapped_column(
String(255),
doc="Who created the rule"
)
# Constraints and indexes
__table_args__ = (
CheckConstraint(
"action IN ('allow', 'deny', 'drop')",
name="ck_firewall_rules_action"
),
Index("idx_firewall_infra", "infrastructure_id"),
)
def __repr__(self) -> str:
"""String representation of the firewall rule."""
return f"<FirewallRule(rule_name='{self.rule_name}', action='{self.action}')>"